Macro Intruders: Sneaking Past Office Defenses

By Talos Group Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable the macro function within Microsoft Word during the late 90s and early 2000s sent these malware into decline. However, a change in Microsoft (MS) Office file formats dating from 2007 is now being […]

Source:: Cisco Security Notice

Macro Intruders: Sneaking Past Office Defenses

By Talos Group Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable the macro function within Microsoft Word during the late 90s and early 2000s sent these malware into decline. However, a change in Microsoft (MS) Office file formats dating from 2007 is now being […]

Source:: Cisco Security Notice

Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks

Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks

Source:: Fortinet

Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks

Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks

Source:: Fortinet

Cisco Completes Acquisition of CloudLock

By David Ulevitch I’m excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock’s unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insights and controls that are easy to deploy and simple to manage. In a new IT landscape marked by personal devices in […]

Source:: Cisco Security Notice

Cisco Completes Acquisition of CloudLock

By David Ulevitch I’m excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock’s unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insights and controls that are easy to deploy and simple to manage. In a new IT landscape marked by personal devices in […]

Source:: Cisco Security Notice

Attackers Evolve Tactics to Infiltrate Your Network via Email

By Scott Bower Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]

Source:: Cisco Security Notice

Attackers Evolve Tactics to Infiltrate Your Network via Email

By Scott Bower Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]

Source:: Cisco Security Notice